Download New Latest (May) Cisco 352-001 Actual Tests 141-150

Ensurepass

 

QUESTION 141  (Topic 2)

 

You are performing a BGP design review for a service provider that offers MPLS-based services to their end customers. The network is comprised of several PE routers that run iBGP with a pair of route reflectors for all BGP address families. Which two options about the use of Constrained Route Distribution for BGP/MPLS VPNs are true? (Choose two.)

 

A.

This feature must be enabled on all devices in the network at the same time.

B.

The RR must advertise the default route target filter toward the PE routers.

C.

The RRs do not need to advertise any route target filter toward the PE routers.

D.

Both PE and RR routers must support this feature.

 

Answer: BD

 

 

QUESTION 142  (Topic 2)

 

In an OSPF network, users in a particular OSPF non-backbone area are complaining about slow access speeds to a shared corporate resource in another OSPF area. Traceroutes show that theusers are taking a suboptimal default route to the destinations. Which solution will improve access speed?

 

A.

Make the area totally stubby so that the default can be followed along the best path.

B.

Create a virtual link between the areas so that traffic can shortcut directly between them.

C.

Implement policy routing to channel the traffic in the optimal direction.

D.

Leak specific summaries on the ABRs for the remote subnets in addition to the default.

 

Answer: D

 

 

QUESTION 143  (Topic 2)

 

Refer to the exhibit.

 

 

 

clip_image001

 

You are planning the design of an encrypted WAN. IP packets will be transferred over encrypted GRE tunnels between routers B and

C.The packet size is limited to a maximum of 1500 bytes inside the WAN between routers B and

C.If endpoint 1 tries to send 1500- byte IP packets to endpoint 2, in what three ways will the network design handle the fragmentation in three different possible network configurations? (Choose three.)

 

A.

When router B fragments packets after the encryption, router C must reassemble these fragmented packets.

B.

When router B fragments packets before the encryption, router C must reassemble these fragmented packets.

C
.

When router B fragments packets after the encryption, the endpoint 2 must reassemble these fragmented packets.

D.

When router B fragments packets before the encryption, endpoint 2 must reassemble these fragmented packets.

E.

When router A fragments packets, router C must reassemble these fragmented packets.

F.

When router A fragments packets, endpoint 2 must reassemble these fragmented packets.

 

Answer: ADF

 

 

QUESTION 144  (Topic 2)

 

You have designed a network to support two offices connected by a T1. Your router serial interfaces will be configured with encapsulation PPP. What will happen to your EIGRP neighbors if there is an LCP failure once your network is implemented?

 

A.

Your neighbors will drop after the EIGRP timers expire.

B.

Your neighbors will stay up because the link has not gone down.

C.

Your neighbors will drop immediately.

D.

Your neighbors will drop and EIGRP will begin the query process.

 

Answer: D

 

 

QUESTION 145

DRAG DROP  (Topic 2)

 

clip_image002

Answer:

clip_image003

 

A.

 

B.

 

C.

 

D.

 

 

Answer:

 

 

QUESTION 146  (Topic 2)

 

After the recent implementation of a new design that incorporated GRE tunnels into the network, the network operations staff is seeing the following syslog message in multiple routers on the network – %TUN-5-RECURDOWN: Tunnel0 temporarily disabled due to recursive routing.

 

From a design perspective, what was not taken into account prior to implementing the solution?

 

A.

The neighboring routers cannot respond within the specified hold time.

B.

The interface on the router that is the source of the tunnel is down.

C.

The interface on the neighboring router that is the source of the tunnel is down.

D.

The router is learning the route to the tunnel destination address using the tunnel

 

 

interface.

E.

The tunnel interface on the router is not receiving any keepalives within the specified hold time.

 

Answer: D

 

 

QUESTION 147  (Topic 2)

 

What are two functions of an NSSA in an OSPF network design? (Choose two.)

 

A.

It overcomes issues with suboptimal routing when there are multiple exit points from the area.

B.

It allows ASBRs to inject external routing information into the area.

C.

An ASBR advertises Type 7 LSAs into the area.

D.

An ABR advertises Type 7 LSAs into the area.

E.

It uses opaque LSAs.

 

Answer: BC

 

 

QUESTION 148  (Topic 2)

 

Which two options are characteristics of firewall transparent mode operations in a firewall solution design? (Choose two.)

 

A.

The firewall acts like a router hop in the network.

B.

OSPF adjacencies can be established through the firewall.

C.

Changes in the existing IP addressing and subnets are required.

D.

Multicast traffic can traverse the firewall.

E.

The firewall can participate actively on spanning tree.

 

Answer: BD

 

 

QUESTION 149  (Topic 2)

 

Refer to the exhibit.

 

 

 

Free VCE & PDF File for Cisco 352-001 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …

 

When designing an MPLS-based LAN extension between DC-1 and DC-2, what are three advantages of deploying VSS? (Choose three.)

 

A.

Layers 2, 3, and 4 flow-based load balancing

B.

native VSS and MEC failover without using scripts

C.

sub-second failover

D.

required to configure VPLS

E.

failover time depends on Cisco IOS EEM and STP convergence

F.

limited VLAN-based VPLS traffic hashing

 

Answer: ABC

 

 

QUESTION 150  (Topic 2)

 

What are two benefits of using BFD for failure detection in the design of a network? (Choose two.)

 

A.

BFD can provide failure detection in less than one second.

B.

BFD can be used as a generic and consistent failure detection mechanism for EIGRP, IS-IS, and OSPF.

C.

BFD eliminates router protocol hello notification.

D.

BFD can be used for all types of network interfaces.

E.

BFD is independent of the network protocol.

 

Answer: AB